Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 9 of 193 results
Sort by: relevance publication year

Recreating the Late Roman Army

BOOK CHAPTER published 1 January 2013 in War and Warfare in Late Antiquity (2 vols.)

Authors: John Conyard

A Critique on Current Methods

BOOK CHAPTER published 2013 in Psychology and Modern Warfare

Authors: Michael Taillard | Holly Giscoppa

Strategy, Diplomacy and Frontiers: A Bibliographic Essay

BOOK CHAPTER published 1 January 2013 in War and Warfare in Late Antiquity (2 vols.)

Authors: Conor Whately

Preliminary Material Volume 1

BOOK CHAPTER published 1 January 2013 in War and Warfare in Late Antiquity (2 vols.)

Authors: Alexander Sarantis | Neil Christie

Index

BOOK CHAPTER published 1 January 2013 in War and Warfare in Late Antiquity (2 vols.)

Authors: Alexander Sarantis | Neil Christie

Fortifications and the Late Roman East: From Urban Walls to Long Walls

BOOK CHAPTER published 1 January 2013 in War and Warfare in Late Antiquity (2 vols.)

Authors: James Crow

War in Late Antiquity: Secondary Works, Literary Sources and Material Evidence

BOOK CHAPTER published 1 January 2013 in War and Warfare in Late Antiquity (2 vols.)

Authors: Conor Whately

Procopius on the Struggle for Dara in 530 and Rome in 537–38: Reconciling Texts and Landscapes

BOOK CHAPTER published 1 January 2013 in War and Warfare in Late Antiquity (2 vols.)

Authors: Christopher Lillington-Martin

3D body scanning technology: Privacy and ethical issues

PROCEEDINGS ARTICLE published June 2012 in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)

Authors: Salah Bindahman | Nasriah Zakaria | Norsaadah Zakaria

A new security mechanism for vehicular communication networks

PROCEEDINGS ARTICLE published June 2012 in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)

Authors: Ghassan Samara | Wafaa A.H. Ali Alsalihy

What Does the Concept of Ambidexterity Mean in the Current Military Planning Process and Organization Construction?

JOURNAL ARTICLE published 1 April 2012 in International Journal of Cyber Warfare and Terrorism

Authors: Aki-Mauri Huhtinen

A Critique on Current Methods

BOOK CHAPTER published 2012 in Economics and Modern Warfare

Authors: Michael Taillard

Adapting the Current National Defence Doctrine to Cyber Domain

JOURNAL ARTICLE published 1 October 2011 in International Journal of Cyber Warfare and Terrorism

Authors: Topi Tuukkanen

Jihad.com2.0

OTHER published 2009 in Influence Warfare

Authors: Aidan Kirby Winn | Vera L. Zakem

U.S. Strategic Communication Efforts during the Cold War

OTHER published 2009 in Influence Warfare

Authors: Daniel Baracskay

USA's View on World Cyber Security Issues

BOOK CHAPTER published 2007 in Cyber Warfare and Cyber Terrorism

Authors: Norman Schneidewind

<title>Measured results of an efficient broadband HF antenna system for reliable all-terrain communication between unattended ground sensors</title>

PROCEEDINGS ARTICLE published 6 August 2002 in SPIE Proceedings

Authors: John Pedersen | James Chabra

Editors: Raja Suresh | William E. Roper

<title>Short-range NLOS ultraviolet communication testbed and measurements</title>

PROCEEDINGS ARTICLE published 29 August 2001 in SPIE Proceedings

Authors: Gary A. Shaw | Melissa L. Nischan

Editors: Raja Suresh

Prejudice and Inferential Communication:

BOOK CHAPTER published 1 October 1998 in Indoctrinability, Ideology and Warfare

Authors: Siegfried Frey

Command, Control and Communication

BOOK CHAPTER published 1991 in Electronic Combat and Modern Warfare

Authors: Neil Munro